Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:46022 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 88195 invoked from network); 11 Nov 2009 09:48:24 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 11 Nov 2009 09:48:24 -0000 Authentication-Results: pb1.pair.com header.from=rquadling@googlemail.com; sender-id=pass; domainkeys=bad Authentication-Results: pb1.pair.com smtp.mail=rquadling@googlemail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain googlemail.com designates 209.85.220.227 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: rquadling@googlemail.com X-Host-Fingerprint: 209.85.220.227 mail-fx0-f227.google.com Received: from [209.85.220.227] ([209.85.220.227:50586] helo=mail-fx0-f227.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 38/93-65174-6688AFA4 for ; Wed, 11 Nov 2009 04:48:23 -0500 Received: by fxm27 with SMTP id 27so836341fxm.23 for ; Wed, 11 Nov 2009 01:48:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:mime-version:received:reply-to:in-reply-to :references:from:date:message-id:subject:to:content-type; bh=eLufDMLgYEBT2frsX2ejGAM8HGId8e8uWpSYOgcsIvM=; b=ArlFALLCbGfIqoXt/f5xy3GcNMrno6uBRGa0oo/KRIO5mis8dLgWvwVX4UHVN9/Uyl 8moSgtFkhS47me4q8nGwW7xOsDqqzi7nxrZpUqDe4qfkGRK8MckSnp1LBEkdu9cZYcxd N3BwP84NmNGLkpBQzqvpwUX7HD4KAwIhDFXco= DomainKey-Signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:content-type; b=SwjamMfHJQtrkyLgX6BJJD79V07CDBrU83gan0NFrbpfoOEY4VMoFZ0ROe79/igU55 xgGf7qHsb8kKxjfLVDx0MKivCOddbPSkTtck7ox3nNiEpTDyp5xNyBAWl+EJAlquy04G OofnEPDr32PhfhtWgRZBx0cqny+EPMXUd7F0U= MIME-Version: 1.0 Received: by 10.223.102.130 with SMTP id g2mr172648fao.52.1257932899216; Wed, 11 Nov 2009 01:48:19 -0800 (PST) Reply-To: RQuadling@googlemail.com In-Reply-To: References: <413588E2-8AC8-49F7-B7BF-97BEFB0A71E4@pooteeweet.org> <4AF9A03E.8000207@cschneid.com> <4AF9AE1A.9000005@zend.com> <4AF9C589.3090604@chiaraquartet.net> <4AF9CCEA.1030500@zend.com> <4AFA0449.2030600@chiaraquartet.net> <4AFA0756.4020609@zend.com> <4AFA0A38.7000502@chiaraquartet.net> Date: Wed, 11 Nov 2009 09:47:02 +0000 Message-ID: <10845a340911110147i647003f3rded43fca844c08fb@mail.gmail.com> To: "internals@lists.php.net" Content-Type: text/plain; charset=UTF-8 Subject: Re: [PHP-DEV] Re: alternative to the fopen() hack in autoloaders From: rquadling@googlemail.com (Richard Quadling) 2009/11/11 Lukas Kahwe Smith : > [snip] Would using a userland-based set_error_handler() be of use here? If, under normal circumstances, blind include() is what is used, then trapping the error when it fails would be when you could test for whatever it is you want to test for? Richard. -- ----- Richard Quadling "Standing on the shoulders of some very clever giants!" EE : http://www.experts-exchange.com/M_248814.html Zend Certified Engineer : http://zend.com/zce.php?c=ZEND002498&r=213474731 ZOPA : http://uk.zopa.com/member/RQuadling